New ZE Loader Targets Online Banking Users

IBM Trusteer closely follows developments in the financial cyber crime arena. Recently, we discovered a new remote overlay malware that is more persistent and more sophisticated than most current-day codes. In this post we will dive into the technical details of the sample we worked on and present ZE Loader’s capabilities and features. The parts […]

The post New ZE Loader Targets Online Banking Users appeared first on Security Intelligence.

Continue reading New ZE Loader Targets Online Banking Users

What’s New in the 2021 Cost of a Data Breach Report

Has cybersecurity ever been more important than it is right now? Even in these extraordinary times, with its focus on manufacturing vaccines and getting shots into arms, new research in the Cost of a Data Breach Report shows that the increasing cost of security breaches makes preventing and responding to these threats a critical concern. […]

The post What’s New in the 2021 Cost of a Data Breach Report appeared first on Security Intelligence.

Continue reading What’s New in the 2021 Cost of a Data Breach Report

Confessions of a Famous Fraudster: How and Why Social Engineering Scams Work

In a world in which bad news dominates, social engineering scams that carry a promise of good news can be incredibly lucrative for cyber criminals.  In one recent example, fraudsters set up a phony job posting using a real recruiter as the contact person for the hiring process. Applicants hoping for a chance at the […]

The post Confessions of a Famous Fraudster: How and Why Social Engineering Scams Work appeared first on Security Intelligence.

Continue reading Confessions of a Famous Fraudster: How and Why Social Engineering Scams Work

Ursnif Leverages Cerberus to Automate Fraudulent Bank Transfers in Italy

Contributed to this research: Segev Fogel, Amir Gendler and Nethanella Messer.   IBM Trusteer researchers continually monitor the evolution and attack tactics in the banking sector. In a recent analysis, our team found that an Ursnif (aka Gozi) banking Trojan variant is being used in the wild to target online banking users in Italy with […]

The post Ursnif Leverages Cerberus to Automate Fraudulent Bank Transfers in Italy appeared first on Security Intelligence.

Continue reading Ursnif Leverages Cerberus to Automate Fraudulent Bank Transfers in Italy

Learning the Building Blocks for Your CIAM Framework Part 3: Manage

Imagine being able to manage hundreds of millions of IDs and process billions of logins and other transactions per day. That’s what you can achieve for your organization by using consumer identity and access management, or CIAM. At the same time, your users can manage their data themselves by having a CIAM system ready to […]

The post Learning the Building Blocks for Your CIAM Framework Part 3: Manage appeared first on Security Intelligence.

Continue reading Learning the Building Blocks for Your CIAM Framework Part 3: Manage

Learning the Building Blocks You Need for Consumer Identity and Access Management Part 2: Engage

Some online experiences are so bad that 25% of users abandon an application after first use and never return. To avoid this retention problem, you should offer better engagement to your customers during their authentication and authorization process. Engage is the second of four building blocks essential for successful consumer identity and access management, or […]

The post Learning the Building Blocks You Need for Consumer Identity and Access Management Part 2: Engage appeared first on Security Intelligence.

Continue reading Learning the Building Blocks You Need for Consumer Identity and Access Management Part 2: Engage

Learning the Building Blocks of Your CIAM Framework Part 1: Capture

Ever been on a website, ready to check out, only to encounter multiple fields to fill at once? Did the process frustrate you and make you close the page without completing your transaction? Such experiences and the resulting loss of customers could be happening to your business. That’s why you need better consumer identity and […]

The post Learning the Building Blocks of Your CIAM Framework Part 1: Capture appeared first on Security Intelligence.

Continue reading Learning the Building Blocks of Your CIAM Framework Part 1: Capture

Synthetic Identity Theft: When Everybody Knows Your Name

You probably have a place where everyone knows your name — and maybe your address and your birthday and your favorite drink. That place could be your favorite restaurant, your office or your grandma’s house. It doesn’t matter where that place is; when everyone in the room greets you by name, it gives you a […]

The post Synthetic Identity Theft: When Everybody Knows Your Name appeared first on Security Intelligence.

Continue reading Synthetic Identity Theft: When Everybody Knows Your Name

What is Ghimob Malware?

A new Android malware strain ‘Ghimob’ is mimicking third-party mobile (mainly banking) apps to spy and steal user data when downloaded and installed. This Trojan virus steals data from users, primarily targeting online banking and cryptocurrency. As of the end of 2020, it is believed to siphon data from more than 153 apps by asking […]

The post What is Ghimob Malware? appeared first on Security Intelligence.

Continue reading What is Ghimob Malware?

Self-Assessment: How Can You Improve Financial Services Cybersecurity?

It’s common knowledge that threat actors target banks. Not only might these attackers want to directly steal money, by doing this they’re also hitting the customers and the trust in the bank. If a financial institution suffers a loss, even insurance can only go so far to minimize the actual cost to the organization. The cost […]

The post Self-Assessment: How Can You Improve Financial Services Cybersecurity? appeared first on Security Intelligence.

Continue reading Self-Assessment: How Can You Improve Financial Services Cybersecurity?